ASUS has disclosed a crucial safety flaw impacting routers with AiCloud enabled that might allow distant attackers to carry out unauthorized execution of capabilities on vulnerable gadgets.
The vulnerability, tracked as CVE-2025-2492, has a CVSS rating of 9.2 out of a most of 10.0.
“An improper authentication management vulnerability exists in sure ASUS router firmware collection,” ASUS stated in an advisory. “This vulnerability will be triggered by a crafted request, doubtlessly resulting in unauthorized execution of capabilities.”
The shortcoming has been addressed with firmware updates for the next branches –
- 3.0.0.4_382
- 3.0.0.4_386
- 3.0.0.4_388, and
- 3.0.0.6_102
For optimum safety, it is beneficial to replace their situations to the most recent model of the firmware.
“Use completely different passwords in your wi-fi community and router administration web page,” ASUS stated. “Use passwords which have not less than 10 characters, with a mixture of capital letters, numbers, and symbols.”
“Don’t use the identical password for a couple of machine or service. Don’t use passwords with consecutive numbers or letters, corresponding to 1234567890, abcdefghij, or qwertyuiop.”
If fast patching just isn’t an choice or the routers have reached end-of-life (EoL), it is suggested to ensure that login and Wi-Fi passwords are robust.
Another choice is to disable AiCloud and any service that may be accessed from the web, corresponding to distant entry from WAN, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP.